Acceptable use Internet access, which connects thousands of computers and millions of subscribers, is available to students and staff.  Internet access can promote educational excellence by facilitating resource sharing, innovation, and communications.

Throughout the educational community, the Internet can be used to educate and inform staff and students.  As a learning resource, the Internet is similar to books, magazines, audio recordings, videos, CD-ROMs, and other information media.  Student and educators use the Internet to participate in distance learning activities, to ask questions, and consult with experts, to communicate with other students, educators, and individuals, and to locate materials to meet educational needs.

The Internet also provides access to material that is of no educational value.  However, the value of the information found and interaction available outweighs the possibility of locating inappropriate material.

Internet access is coordinated through a complex association of government agencies, as well as regional and state networks.  The smooth operation of the network relies upon the proper conduct of all users who must adhere to strict guidelines.  The guidelines, which require efficient, ethical, and legal utilization of the network resources, are provided here so that users are aware of the responsibilities they are about to acquire.  In addition, guidelines from other service providers may result in access being suspended and or future access being denied.

Online Responsibilities

a. Acceptable use

The goal of providing Internet access for students and staff is to support education and research consistent with the           educational objectives of the School.  Transmission of any material in violation of any federal or state regulation is prohibited.  This includes, but is not limited to, copyrighted material, threatening or obscene material, or material in violation of School  Policies.

b. Privileges

The use of the Internet is a privilege, not a right, and inappropriate use will result in suspension of that privilege.  The equipment, network, and data are the sole property of the School.  Therefore, the School retains the right to monitor and or audit any network account at random to insure that the user is adhering to this policy.
c.    Network Etiquette

While each user has the right to free speech, each user is expected to abide by the School’s accepted code of conduct. Appropriate behavior in telecommunications includes, but is not limited to:

i.              Being polite

ii.             Using appropriate conduct.  Do not swear, use vulgarities, be abusive, post or publish objectionable material, or use any other inappropriate language.

iii.            Not engaging in illegal activities.

iv.           Not revealing personal addresses or phone numbers.

v.            Recognizing that school electronic mail is not private.  Messages relating to or in support of illegal activities or in violation of the acceptable use policy will be reported to appropriate authorities.

vi.           Not knowingly or carelessly performing an act that will interfere with the normal operation of computers, peripherals, or networks.

vii.          Respecting copyright laws.  All communications and information access via the network are private property unless otherwise stated.

viii.         Not employing the network for commercial purposes.

ix.           Not transmitting material that infringes upon the right of others.

d.    Warranty

The School makes no warranties of any kind, whether expressed or implied, for the service it is providing. The School will not be responsible for any damages suffered using the Internet.  These include, but are not limited to, loss of data resulting from delays, nondeliveries, misdeliveries, service interruptions, or personal errors or omissions.  Use of any information obtained via the Internet is at the user’s risk.  The School specifically denies any responsibility for the accuracy or quality of information obtained through Internet access.

e.    Security

Security on a computer system is critical especially when a system involves many users.  Proper procedures for logging in and off the network must be followed.  If a security problem is identified, the user must notify a system administrator or staff member.  The problem may not be demonstrated to other users.  Unauthorized use of accounts is strictly prohibited. Attempts to log on the Internet as the network administrator will result in immediate cancellation of user privileges.  Users who have a history of problems with other computer systems or who have been identified as a security risk for any other reason will be denied access to the network.

f.     Vandalism

Vandalism will result in suspension or cancellation of privileges.  Vandalism is defined as any malicious attempt to harm or destroy the data of another user or to damage other networks.  This includes but is not limited to the uploading or creation of computer viruses.


All students have complete access to the Internet. Its intended use is for research for courses at the School. Any use of the Internet where profanity, obscenity, or otherwise distasteful material is displayed will result in immediate termination from the School and from one‘s program of study. An instructor may give the student only one warning before reporting the behavior to administrationIt is not necessary for a warning to be issued before action is taken. Also, any student who intentionally denies access to another student through the changing of passwords on the School’s network will be placed on conduct probation immediately. A second offense of this nature will result in immediate termination from the School. Users are expected to abide by the following code:

  • Files, usernames, and computer output belong to the individual and are to be considered personal property. Users shall not examine or use someone else’s file or output or employ someone else’s username without explicit permission. Attempts to circumvent the protective mechanisms in the computer system shall be considered violations of the right to privacy.
  • Users shall not deliberately attempt to degrade system performance or capability. Loopholes in the computer system or knowledge of special passwords shall not be used to damage the system, take resources from another user, or violate privacy.
  • No material that could be considered obscene or offensive shall be entered into the computer or sent through the electronic mail system.
  • Any unauthorized or illegitimate use of computer resources, facilities, or software shall constitute a violation of School policy and shall subject the violator to disciplinary and/or legal action by the School.
  • Users are provided a unique user name and password and are prohibited from providing the user’s name and password to any other individual.
  • Student identity, of student participating in online courses/programs, is authenticated through a series of email, telephone interviews, and/or meetings with my Online Learning Coordinator and Student Services Coordinator. The students’ username, password and email address are used to authenticate the student’s identity in order to complete assignments within the Learning Management System. All testing is completed through the Learning Management System and the student’s unique username and password is used to verify the student’s identity.
  • A student’s unique username and password is used to verify the student identity and neither the Institution nor Delta Career Education Corporation will release the student’s username and password to any individual which would violate the student’s rights under the Federal Educational Rights and Privacy Act.

Social Media Guidelines
The Creative Circus  believes is an open and creative environment.  Given the popularity of social media, there are guidelines that all students should abide by while creating or contributing to blogs, wikis, social networks , virtual worlds of any kind of social media. These apply to all students  while on campus or at an alternate location.  If used properly, engaging in social media helps build strong and successful relationships. If used inappropriately, it can damage ones reputation and potentially prohibit gainful employment.

A few tips for appropriate use of social media:

  • Be transparent – Your honesty or dishonesty will be quickly noticed in the social media environment.
  • Be judicious – All statements must be true and not misleading.
  • Perception is reality – In online social networks, the lines between public and private, personal and professional are blurred.
  • It’s a conversation – Talk to the readers like you would talk to real people in a professional situation.
  • Your responsibility – what you write is ultimately your responsibility.
  • Be a leader – There is a fine line between healthy debate and incendiary reaction. Do not denigrate others. Try to frame what you write to invite differing points of view without inflaming others.
  • Did you screw up? – If you make a mistake, admit it. Be upfront and and be quick with the correction.
  • Thinking twice – If you’re about to publish something that makes you even the slightest bit uncomfortable, think twice before hitting the “send” button.